Local privilege escalation due to DLL hijacking vulnerability. The following products are affected: Acronis Cyber Files (Windows) before build 9.0.0x24.
References
Link | Resource |
---|---|
https://security-advisory.acronis.com/advisories/SEC-7220 | Vendor Advisory |
Configurations
History
18 Oct 2024, 20:10
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:acronis:cyber_files:*:*:*:*:*:windows:*:* | |
References | () https://security-advisory.acronis.com/advisories/SEC-7220 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
First Time |
Acronis
Acronis cyber Files |
18 Oct 2024, 12:52
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
17 Oct 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-17 10:15
Updated : 2024-10-18 20:10
NVD link : CVE-2024-49391
Mitre link : CVE-2024-49391
CVE.ORG link : CVE-2024-49391
JSON object : View
Products Affected
acronis
- cyber_files
CWE
CWE-427
Uncontrolled Search Path Element